cybersecsi / houdiniLinks
Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.
β1,249Updated 2 months ago
Alternatives and similar repositories for houdini
Users that are interested in houdini are comparing it to the libraries listed below
Sorting:
- A repo to automatically generate and keep updated a series of Docker images through GitHub Actions.β560Updated this week
- π A curated list of awesome Docker security resourcesβ706Updated 2 months ago
- β571Updated 3 years ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!β2,189Updated 3 months ago
- Checklist for container security - devsecops practicesβ1,611Updated 4 months ago
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web servicesβ488Updated 2 years ago
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.β2,182Updated last year
- Granular, Actionable Adversary Emulation for the Cloudβ2,228Updated last week
- A Blazing fast Security Auditing tool for Kubernetesβ1,007Updated last year
- My cheatsheet notes to pentest AWS infrastructureβ703Updated 3 years ago
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, β¦β1,043Updated 7 months ago
- Automated Red Team Infrastructure deployement using Dockerβ1,261Updated 3 years ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organizationβ2,026Updated last year
- Detector for Log4Shell exploitation attemptsβ726Updated 3 years ago
- Automating situational awareness for cloud penetration tests.β2,284Updated this week
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secuβ¦β1,063Updated last week
- A curated list of awesome CI CD security resourcesβ804Updated 3 months ago
- An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchmβ¦β767Updated last year
- RedEye is a visual analytic tool supporting Red & Blue Team operationsβ2,739Updated 2 years ago
- π¦π Awesome list of secrets in environment variables π₯οΈβ900Updated 3 years ago
- Peirates - Kubernetes Penetration Testing toolβ1,413Updated last week
- A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.β1,567Updated 3 years ago
- all paths lead to cloudsβ638Updated 2 years ago
- A curated list of awesome Kubernetes security resourcesβ952Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β1,475Updated 3 years ago
- API Security Project aims to present unique attack & defense methods in API Security fieldβ1,429Updated last year
- A curated list for Awesome Kubernetes Security resourcesβ1,986Updated 2 months ago
- LunaSec - Dependency Security Scanner that automatically notifies you about vulnerabilities like Log4Shell or node-ipc in your Pull Requeβ¦β1,462Updated last year
- A DFIR tool written in Python.β1,053Updated 4 years ago
- π‘οΈ Awesome Cloud Security Resources βοΈβ2,345Updated last year